IHE IT Infrastructure Technical Framework Supplement. Cross-Community Fetch (XCF) Trial Implementation

Size: px
Start display at page:

Download "IHE IT Infrastructure Technical Framework Supplement. Cross-Community Fetch (XCF) Trial Implementation"

Transcription

1 Integrating the Healthcare Enterprise 5 IHE IT Infrastructure Technical Framework Supplement 10 Cross-Community Fetch (XCF) 15 Trial Implementation 20 Date: August 31, 2015 Author: ITI Technical Committee iti@ihe.net 25 Please verify you have the most recent version of this document. See here for Trial Implementation and Final Text versions and here for Public Comment versions.

2 Foreword This is a supplement to the IHE IT Infrastructure Technical Framework V11.0. Each supplement undergoes a process of public comment and trial implementation before being incorporated into the volumes of the Technical Frameworks. This supplement is published on August 31, 2015 for trial implementation and may be available for testing at subsequent IHE Connectathons. The supplement may be amended based on the results of testing. Following successful testing it will be incorporated into the IT Infrastructure Technical Framework. Comments are invited and may be submitted at This supplement describes changes to the existing technical framework documents. Boxed instructions like the sample below indicate to the Volume Editor how to integrate the relevant section(s) into the relevant Technical Framework volume. Amend Section X.X by the following: Where the amendment adds text, make the added text bold underline. Where the amendment removes text, make the removed text bold strikethrough. When entire new sections are added, introduce with editor s instructions to add new text or similar, which for readability are not bolded or underlined General information about IHE can be found at: Information about the IHE IT Infrastructure domain can be found at: Information about the structure of IHE Technical Frameworks and Supplements can be found at: and The current version of the IHE Technical Framework can be found at: 2

3 CONTENTS Introduction... 5 Open Issues and Questions... 5 Closed Issues... 5 Volume 1 Profiles History of Annual Changes Dependencies among Integration Profiles Cross-Community Fetch (XCF) Profile Actors/Transactions XCF Profile Options Asynchronous Web Services Exchange Option XCF Actor Groupings and Profile Interactions XCF Required Groupings XDS/XCA Interactions (Informative) responding agent for XDS (Grouping with Document Consumer) responding agent for XCA initiating agent for XDS initiating agent for XCA Profile Interactions (Informative) XCF Process Flow Use Cases Patient Summary Service with Translation/Transforming Use Case Highly Regulated Data Sharing Scenarios Process Flow XCF Profile Security Considerations XCF Risk Assessment Appendix B Transaction Summary Definitions Volume 2 Transactions Cross Gateway Fetch Scope Use Case Roles Referenced Standards Interaction Diagram Cross Gateway Fetch Request Trigger Events Message Semantics Query Parameters for Cross Gateway Fetch Requests Use of homecommunityid Inclusion of Document Associations Cross Gateway Fetch request message example Expected Actions Cross Gateway Fetch Response

4 Trigger Events Message Semantics Expected Actions Document Metadata Error Codes Protocol Requirements Security Considerations Security Audit Considerations Sample Request Message (Informative) Sample Response Message (Informative) Volume 3 Cross-Transaction Specifications and Content Specifications

5 Introduction The Cross-Community Fetch (XCF) Profile defines a single transaction for accessing medical data between gateways that facilitate multiple dimensions of communication (trust, semantics, encoding, legislation, authority, etc.). The profile is highly inspired by the Cross Gateway Query/Cross Gateway Retrieve transactions and integrates these originally distinct transactions. In specific use cases, for example when a few dynamically created documents need to be accessed from interacting communities with centralized data localization, a single transaction (versus independent query and retrieve) may reduce the coordination and maintenance of the transactional dependencies and transaction states. For such use cases, and in environments where stateless Responding Gateways can be designed, it simplifies the implementation of such Responding Gateways. However, it may increase the implementation complexity of Initiating Gateways serving some types of communities, such as XDS Affinity Domains. XCF offers a different deployment option from the general purpose XCA Profile. Open Issues and Questions XCF008: This supplement introduces the concept of automated document transforms at the XCF Responding Gateway while not necessarily making the transformed document persistent. For patient safety and traceability reasons this aspect might need to be discussed further. XCF009: The relationship/difference to on-demand should be provided. Closed Issues XCF001: Can the XDS FindDocuments UUID be used as a query id for the Fetch, too? Decision is made (TCon on ) to assign a new UUID as Fetch is an adapted subset of FindDocuments query with a specific semantics. XCF002: How does the initiating side interact with an XDS affinity domain (e.g., if the Initiating Gateway is part of that affinity domain)? How can an XDS document consumer actor interact with an XCF Initiating Gateway? Are there at all any use cases, where it makes sense that an XDS document consumer performs cross-community document sharing by using XCF instead of XCA? See Section 29.3 for guidance. XCF003: What happens if a message is routed through a network of both XCA and XCF gateways? Are these gateways interoperable? See Section 29.3 for guidance. XCF004: How can document relationships be expressed in a Fetch response? Document relationship can be expressed by ebrs Association Objects which are places within the RegistryObjectList. XCF005: OASIS ebxml Registry allows for iterations on query results by defining an optional startindex element within a query request. By using this element one of the major limitations of Fetch the inability to deal with large result sets could be resolved. Should the use of 5

6 startindex be allowed as an option for the XCF Profile? Decision is: NO. Such functionality may contradict the simple approach of the profile by greatly adding to its potential complexity. XCA is assumed to be used for massive data sets that require special treatment. XCF006: How should actors and transaction be named? Options discussed for the transaction are Query and Retrieve, Simple Query and Cross Gateway Simple Query. The actor names Initiating Gateway and Responding Gateway are already used for XCA Gateways. Decision is Cross-Community Fetch for the profile and Cross Gateway Fetch for the transaction. XCF007: Risk analysis must be performed on the question whether a Responding Gateway should respond with a NoConsent error in case that the patient has not given consent to sharing his data. As an alternative a neutral error or an empty result set could be returned. Using a NoConsent error only makes sense if the patient could then give the required consent at the point of care which would allow a physician to re-issue the request. Decision: In a rather general environment issuing such an error might be considered as an unlawful data disclosure by revealing that there (1) is such a patient that (2) has data available but (3) did not consent into electronic data processing of his medical information. While the accompanying XUA assertion of a health care professional may be interpreted as forming a trusted environment that may actually justify this error message as facilitator, such an assumption is not valid for all environments/contexts. Therefore, such an error may not be issued by default. We agreed to return no documents. 6

7 Volume 1 Profiles History of Annual Changes Add the following bullet to the end of the bullet list in Section 1.7 Added the Cross-Community Fetch Profile for exchanging accessing medical data between stateless gateways that facilitate multiple dimensions of communication (trust, semantics, encoding, legislation, authority, etc.). Add the following section to Section Dependencies among Integration Profiles Cross-Community Fetch ATNA Each XCF Actor shall be grouped with the ATNA Secure Node or Secure Application Actor. Cross-Community Fetch CT Each XCF actor shall be grouped with the Time Client Cross-Community Fetch XUA Each XCF Actor shall be grouped with the appropriate XUA Actor Required to manage audit trail of exported PHI, node authentication and transport encryption. To ensure consistency among document and submission set dates. Required to provide user identity and context Add the following new section Cross-Community Fetch (XCF) Profile The Cross-Community Fetch (XCF) Profile defines a single transaction for accessing medical data between gateways that facilitate multiple dimensions of communication (trust, semantics, encoding, legislation, authority, etc.). The profile is highly inspired by the Cross Gateway Query/Cross Gateway Retrieve transactions. In specific use cases, for example when a few dynamically created documents need to be accessed from interacting communities with centralized data localization; a single transaction (versus independent query and retrieve) may reduce the coordination and maintenance of the transactional dependencies and transaction states. For such use cases, and in environments where stateless Responding Gateways can be designed, XCF simplifies the implementation of such Responding Gateways. However, it may increase the implementation complexity of Initiating Gateways serving some types of communities, such as 7

8 XDS Affinity Domains. XCF offers a different deployment option from the general purpose XCA Profile. The transaction fetches a small number of documents based upon a few retrieval parameters. This transaction is simplified to permit easier implementation and better performance on Responding Gateways. Transcoding and translation of the documents and other data can be performed on the Responding Gateway as part of the transaction. The XCF Profile stipulates that the following prerequisites are met: the document properties to be communicated are known in advance the result data sets can be characterized in advance the documents are feasible to be returned in a single response no further selection and/or manual interaction is needed in the communication process preconditions, such as purpose of use, legitimate data, and environment, are agreed upon in advance and are documented in a community or framework agreement the document fetching may not always be repeatable it may not be assumed in every case that the same query with the same query parameters will return the same document version with the same document id. Ideally, only one document will satisfy the Fetch (e.g., only the most current instance of a patient summary is provided by the Responding Gateway). If the size of the set of documents matching the request is too large to be packed into a single response, an error code is returned by the Responding Gateway. The assumption is that the XCA Profile is used when requests are expected to return a large number of documents Actors/Transactions Figure shows the actors directly involved in the XCF Profile and the relevant transactions between them. Initiating Gateway Cross Gateway Fetch [ITI-63] Responding Gateway Figure : XCF Actor Diagram 225 Table lists the transactions for each actor directly involved in the XCF Profile. In order to claim support of this Profile, an implementation must perform the required transactions (labeled 8

9 R ). Transactions labeled O are optional. A complete list of options defined by this Profile and that implementations may choose to support is listed in Volume 1, Section Table : XCF Profile - Actors and Transactions Actors Transactions Optionality Section in Vol. 2b Initiating Gateway Cross Gateway Fetch [ITI-63] R ITI-TF-2b:3.63 Responding Gateway Cross Gateway Fetch [ITI-63] R ITI-TF-2b: XCF Profile Options Options that may be selected for this Profile are listed in the Table along with the actors to which they apply. Dependencies between options when applicable are specified in notes. Responding Gateway Table : XCF - Actors and Options Actor Options Vol. & Section no options Initiating Gateway Asynchronous Web Services Exchange The Responding Gateways shall support Asynchronous Web Services Exchange Option on the Cross Gateway Fetch. Support for this function is required in order to enable use of Asynchronous Web Services Exchange in any cross-community interaction Asynchronous Web Services Exchange Option Initiating Gateways which support Asynchronous Web Services Exchange shall support Asynchronous Web Services Exchange on the Cross Gateway Fetch [ITI-63] transaction XCF Actor Groupings and Profile Interactions XCF Required Groupings The Initiating Gateway shall be grouped with ATNA Secure Node or ATNA Secure Application, CT Time Client and XUA X-Service User. The Responding Gateway shall be grouped with ATNA Secure Node or ATNA Secure Application, CT Time Client and XUA X-Service Provider XDS/XCA Interactions (Informative) Interoperable interaction between communities which have chosen to implement only XCF and those that are based on XDS or XCA may be enabled through transformation agents. IHE does not specify the mechanism used by such transformation agents or any details about their 9

10 implementation. The following sections give a high level perspective on the challenges of enabling four cases of agents: 1. responding agent for XDS- acts as an XCF Responding Gateway and converts incoming Cross Gateway Fetch transactions into XDS transactions to collect the content needed for the response. 2. responding agent for XCA- acts as an XCF Responding Gateway and converts incoming Cross Gateway Fetch transactions into XCA transactions to collect the content needed for the response. 3. initiating agent for XDS acts as an XCF Initiating Gateway and converts XDS transactions into Cross Gateway Fetch transactions to collect content from XCF only communities. 4. initiating agent for XCA acts as an XCF Initiating Gateway and converts XCA transactions into Cross Gateway Fetch transactions to collect content from XCF only communities. Some agents are relatively easy to implement and others are quite complicated. In environments where integration of with XCA and XDS is important it would be advisable to consider XCA with the On-Demand Documents Option as an alternative to the use of XCF responding agent for XDS (Grouping with Document Consumer) A responding agent for XDS converts incoming Cross Gateway Fetch transactions into Registry Stored Query and Retrieve Document Set transactions which are directed to a local XDS Registry/Repository. This type of agent has value because it allows access by XCF only communities to content within XDS based communities. A responding agent for XDS can be enabled through a relatively simple grouping of XDS Document Consumer and XCF Responding Gateway. The agent must convert the Cross Gateway Fetch query into a collection of Registry Stored Query and Retrieve Document Set transactions. This conversion is relatively straightforward; the query in the Cross Gateway Fetch transaction maps closely to the Find Documents stored query of Registry Stored Query and from this query the agent can generate appropriate Retrieve Document Set transactions to get the document contents. Several additional details need to be managed by the agent, like supplying document associations and handling situations when the results are too large to be returned in the Cross Gateway Fetch response. Figure depicts this environment. 10

11 Community A responding agent for XDS Community B XCF Initiating Gateway Cross Gateway Fetch ITI-63 XCF Responding Gateway Internal (unspecified mechanism) XDS Document Consumer Registry Stored Query ITI-18 Retrieve Document Set ITI-43 XDS Document Registry XDS Document Repository Figure : responding agent for XDS responding agent for XCA A responding agent for XCA converts incoming Cross Gateway Fetch transactions into Cross Gateway Query and Cross Gateway Retrieve transactions which are directed to a XCA Responding Gateway. This type of agent has value because it allows access by XCF only communities to content within XCA based communities. A responding agent for XCA groups with an XCA Initiating Gateway in order to initiate Cross Gateway Query and Cross Gateway Retrieve transactions to a XCA Responding Gateway. The agent must convert the Cross Gateway Fetch query into an appropriate query supported by Cross Gateway Query and must interpret and collect the results of the Cross Gateway Query and Cross Gateway Retrieve in order to respond to the Cross Gateway Fetch transaction. The query mapping and translation across transactions is equivalent to the work involved in a responding agent for XDS. Figure depicts this environment. 11

12 Community A responding agent for XCA Community B XCF Initiating Gateway Cross Gateway Fetch ITI-63 XCF Responding Gateway Internal (unspecified mechanism) XCA Initiating Gateway Cross Gateway Query ITI-38 Cross Gateway Retrieve ITI-39 XCA Responding Gateway Figure : responding agent for XCA initiating agent for XDS An initiating agent for XDS enables access by the significant number of products supporting the XDS Document Consumer to content within a community that only supports XCF. Without this kind of enablement EMR/EHR systems (and others) will be cut off from the content held by a community that chooses to support only XCF. Enabling this interaction is more difficult than the other direction and this section only skims the surface of the work involved. The initiating agent for XDS must be able to convert the contents of Registry Stored Query [ITI-18] transactions into Cross Gateway Fetch transactions. Typically this will involve the conversion of the Find Documents stored query. Along with copying all the parameters, the initiating agent for XDS must also manage a few other aspects of the query request. Handling the response from the Cross Gateway Fetch transactions involves storing locally the parts not immediately requested by the XDS Document Consumer and returning only the parts that are appropriate. For example, the Cross Gateway Fetch transaction will return the documents associated with the metadata. The initiating agent for XDS cannot return these documents in the Registry Stored Query transaction so must save them locally in order to be able to return them upon receipt of a Retrieve Document Set transaction. The local storage, called Copy of Community B content in the diagram, looks a little like an XDS Registry/Repository system managed and used by the initiating agent for XDS. This storage will also need to hold the metadata returned in the Cross Gateway Fetch to respond to Registry Stored Query transactions that use stored queries other than Find Documents. The complete design of the initiating agent for XDS is a non-trivial task and not further described by IHE. 12

13 Community A initiating agent for XDS Community B Document Consumer Registry Stored Query ITI-18 Retrieve Document Set ITI-43 like XCA Initiating Gateway with XDS Affinity Domain Option Internal (unspecified mechanism) XCF Initiating Gateway Cross Gateway Fetch ITI-63 XCF Responding Gateway Copy of Community B Content Figure : initiating agent for XDS initiating agent for XCA An initiating agent for XCA enables access by communities using a XCA Initiating Gateway to access content within a community that only supports XCF. Without this kind of enablement XCA communities will be cut off from the content held by a community that chooses to support only XCF. Enabling this interaction is very similar to the enablement for XDS. Figure presents a view of how this enablement might be designed and represents the small differences from the initiating agent for XDS described in Section Community A initiating agent for XCA Community B XCA Initiating Gateway Cross Gateway Query ITI-38 Cross Gateway Retrieve ITI-39 XCA Responding Gateway Internal (unspecified mechanism) XCF Initiating Gateway Cross Gateway Fetch ITI-63 XCF Responding Gateway Copy of Community B Content Figure : initiating agent for XCA 13

14 Profile Interactions (Informative) Potential interactions for XCF with other IHE profiles are illustrated in this real world example. It is assumed that a gateway infrastructure is set up for sharing patient s medical summary data among autonomous regions. Each region collects a different set of data for its patients and makes use of its own document schema and builds upon its specific taxonomies for coding values. Patients may define privacy policies for their data and give general consent for data sharing in their region of affiliation while healthcare professionals are authenticated in the region of care. Gateways perform all the transcoding, trust brokerage and access control enforcement such that all the (technical) complexity of this use case is hidden from the existing regional infrastructures and the acting persons. As a result of this hidden complexity, from the physician s perspective this use case is just a single operation: retrieval of an identified patient s medical summary. Organizationally, the concrete service delivery steps may be assigned to existing relevant IHE profiles for partial task fulfillment. Service Delivery Step Claim about requestor authenticity Table : IHE Profile Assignment / Interaction Provisioning of requestor identity attributes (local roles, permissions, treatment context, delegation) Establishing and Verifying Trust Relationships between the initiating and responding gateways Establishing an Audit Trail for traceability between initiating and responding gateway Verification of the patient s privacy consent Assurance of health information integrity and originator authenticity Policy Decision and Policy Enforcement at each of the gateways Health Information Exchange with opaque regional infrastructures Canonical encoding of patient summary document for sharing information among autonomous regions Support provided by IHE Profiles Initiating gateway grouped with IHE XUA X-Service- User Responding gateway grouped with IHE XUA X- Service-Provider IHE XUA attributes Deployment of the gateways as IHE ATNA Secure Nodes IHE ATNA Audit Trail IHE BPPC encoded consents accessed through IHE XDS transactions. IHE DSG for document digital signatures Policy Decision and Policy Enforcement (IHE White Paper on Access Control) May be implemented by IHE XDS or other Entity Services intentionally opaque e.g., IHE PCC XDS-MS (Medical Summary Document Content) as content model 355 The translation and transcoding of patient summary data from a regional encoding into the canonical encoding at the Responding Gateway and the reverse transformation at the Initiating Gateway are out of the scope of IHE and subject to individual implementation (even though profiles like IHE SVS can help with the management of value sets). The Figure shows 14

15 360 the respective document transformations, which require from the consumer s perspective - at least two intermediary documents. Human Requestor Initiating Gateway Responding Gateway Document Provider Data Provider Patient Summary? Patient Summary? subset of patient data another subset of patient data DocID: 17 DocID: 17 Transformation into cannonical format/coding Assembly into source format/coding DocID: 24 Transformation into target format/coding DocID: 24 DocID: 51 DocID: Figure : Document ID flown in cross-country use case with translation/transcoding scenario This use case gives an impression of the problems that may arise if data discovery and retrieval across data processing gateways are split among multiple transactions within a logical session: Consents and policies have to be enforced again with each request. This requires that each transaction carries enough information to allow the responding gateway to discover and enforce the matching policies By using the Cross Gateway Fetch transaction, the participating Responding Gateways and actors do not have save the intermediate formats and objects. Another way of avoiding saving intermediate formats is to use the On-Demand Documents Option of XCA. For accessing the requested, transcoded data all security checks must only be performed once (including certificate verification, consent fetching, and policy enforcements) and common information for policy discovery and assessment (particularly patient identifier and document type) is available at the responding gateway before any medical data has been accessed. However, it may increase the implementation complexity of Initiating Gateways serving some types of communities, such as XDS Affinity Domains XCF Process Flow Use Cases 15

16 Patient Summary Service with Translation/Transforming Use Case This use case may be supported either by XCA or XCF. A typical use case where data is processed on gateways is health data sharing among autonomous regions (states, countries) with distinct healthcare infrastructures and regulatory frameworks. As modifications on existing services and systems are typically not possible, gateways are used to encapsulate the specifics of the regional infrastructures and regulations. These gateways perform a transformation of data schema and coding from regional format to a canonical format and vice versa and implement means to broker trust among the regions by acting as guarantors for the enforcement of agreed security services (e.g., on originator authenticity and proper authentication). Health data sharing among autonomous regions is limited to an agreed set of documents because for example: many of the use cases of cross-regional care cover unscheduled care scenarios where a physician does not want to access the full EHR of a patient but is rather interested in aggregated health status information reimbursement regulations only cover specific phases of a treatment (e.g., Dutch patients being allowed to go to Germany for certain surgeries) that require access to be restricted to a defined set of documents The XCF Profile provides simple access to documents of limited number and volume within a gateway infrastructure, where the initiating regions have simple environments Highly Regulated Data Sharing Scenarios Two states are enabling access for their citizen s emergency data-sets. The contents of the data set are well specified in advance, and only documents that are sanctioned will be accessed. A framework or community agreement needs to exist that governs, which documents, what contents and encoding are to be communicated under which conditions and environments. Both states reserve the right to enforce policies at their respective domain and may not be forced to adapt or change their existing I.T.-systems due to the principle of sovereignty. Furthermore, only the most recent version of the emergency data-set is to be communicated at any time, potentially existing older version must not be communicated or made available for patient safety reasons: querying for just any document is disallowed Process Flow Figure shows a typical Cross-Community Fetch data access pattern where the XCF Profile can be used: 1. An initial requestor requests a defined kind of document about an already identified patient. The requestor connects to the Initiating Gateway using a mechanism not constrained by the XCF Profile. Examples of such mechanisms are filling a form at a web portal that is grouped with the Initiating Gateway or using a proprietary document type specific web service that is grouped with the Initiating Gateway (e.g., a dedicated patient summary service ). 16

17 The Initiating Gateway initiates a XCF Fetch request message to the Responding Gateway will be able to fulfill the initial request. 3. The Responding Gateway processes the request message (e.g., enforcing community specific security policies) and obtains the requested information from any data managing actor within its community. The provided data is processed as previously agreed between the communicating communities (encoding, schema, etc.). 4. The Responding Gateway sends a XCF Fetch response message to the Initiating Gateway. 5. The Initiating Gateway verifies that the data provided confirm to the agreed policies. It processes the data to match its domain s local policies and sends it to the Initial Requestor. Initial Requestor Initiating Gateway Responding Gateway Data Managing Actor request defined medical documents [proprietary mechanism] Cross Gateway Fetch req. [ITI-63] process request obtain requested data [e.g. via IHE transactions] Cross Gateway Fetch resp. [ITI-63] process provided data provide defined medical documents [proprietary mechanism] process provided data Figure : Basic Process Flow in XCF Profile Figure shows an illustration of this basic process flow described above. In this scenario, the Audit Trail and Node Authentication (ATNA) and IHE Cross-Enterprise User Assertion (XUA) Profiles are used to safeguard the communication and allowing the responding side to enforce fine-grained local security policies. Part of the initial request processing at the Responding Gateway is the verification that the patient has given consent to the use of his data for this purpose. For this purpose the Responding Gateway may be grouped with a Document Consumer to obtain an IHE Basic Patient Privacy Consent (BPPC) coded consent document via XDS Registry Stored Query [ITI-18] and Retrieve Document Set [ITI-43] transactions. If the responding community is organized as a XDS Affinity Domain, XDS can be used to obtain the requested data (see Section ). In this case the Responding Gateway is grouped with a 17

18 Document Consumer (which may be the same as used for consent retrieval) that initiates the XDS transactions for obtaining the requested data. In advance, the communicating communities agreed on a canonical format for sharing documents. It is the responsibility of the Responding Gateway to transform, translate and transcode the data from its local format to the canonical format as agreed between the Initiating and Responding Gateways. The reverse action is taken at the Initiating Gateway: the data received from the Responding Gateway is transformed at the Initiating Gateway, translated and transcoded into the local format. Initial Requestor Initiating Gateway Responding Gateway Document Registry Document Repository request patient summary [non.ihe transaction] verify requestor identity anc obtain X-User- Assertion (e.g. via XUA) Cross Gateway Fetch request [ITI-63] Provide X-User-Assertion [ITI-40] Document Consumer get patient s BPPC via [ITI-18] and [ITI-43] verify consent get patient summary via [ITI-18] and [ITI-43] Cross Gateway Fetch response [ITI-63] transform and transcode into agreed cannonical format transform and transcode into local format provide patient summary [non.ihe transaction] 455 Figure : Process Flow with Consent/Policy Enforcement and Document Transcoding 29.5 XCF Profile Security Considerations XCF Risk Assessment The risk analysis for XCF enumerates assets, threats, and mitigations. The complete risk data may be found at ftp://ftp.ihe.net/it_infrastructure/iheitiyr

19 /Technical_Cmte/Profile_Work/XCA- QueryRetrieve/XCFetch_Risk_assessment_and_mitigation_table_V1.xls. This risk analysis extends the general IHE risks and threats analysis (see ITI TF-1: Appendix L) for risks and mitigations that are specific to the XCF actors. Vendor and operators of XCF actors are also advised that many risks cannot be mitigated by the IHE profile and instead the responsibility for mitigation is transferred to the vendor, and occasionally to the communities and enterprises that operate XCF gateways. In these instances, IHE fulfills its responsibility to notify affected parties through the following section. The following general mitigations shall be implemented by all XCF actors. These mitigations moderate all currently known high impact risks. Implementers are strongly advised to periodically reassess threats and mitigations to those threats, and to employ robust and secure design, programming and operational management practices. In case that any or both of the gateways perform transcoding, transformation or translation of metadata or document data, the following mitigation addresses the risks associated with wrong transformations. The original (human) requestor should be given the ability to additionally fetch an original document which is not automatically modified during the Cross Gateway Fetch transaction. This may either be implemented through a dedicated document class code for original data or by using the document relationship mechanism as described in Section All actors in XCF shall be grouped with an ATNA Secure Node and a CT Time Client to, respectively, ensure confidentially and consistent logs. Document metadata shall include a hash of the document content to enable low/moderate assurance document integrity confirmation. Use of document digital signatures (DSG) may be used, if needed, for more high assurance document integrity and non-repudiation of origin purposes. The Initiating Gateway should issue Cross Gateway Fetch requests that result in a single, unambiguous, document to be found and returned whenever possible and must supply both a patient identifier and a document class code identifier. To reduce the ability of attackers to phish for data, a Responding Gateway which receives a fetch request for unknown patient identifiers or document class codes shall return a response containing zero documents, with no further information. This applies to patient identifiers and class code identifiers that are properly formatted or improperly formatted. Initiating Gateways shall provide an X-user Assertion (XUA) with the Cross Gateway Fetch request in order to allow the Responding Gateway to enforce a local security policy. Responding Gateways should assess a local security policy before responding to the request or retrieval of any metadata or data. The local security policy should include the enforcement of a Basic Patient Privacy Policy (BPPC). 19

20 500 Initiating Gateways may verify the patient identifier included with a received document s header against the original patient identifier that was used for the request. General developmental and operational best practices should be observed. Add the following new item to Appendix B 20

21 505 Appendix B Transaction Summary Definitions Cross Gateway Fetch - fetches a document or a set of documents from a remote community that match a given set of metadata attribute values. 21

22 Add Section 3.63 Volume 2 Transactions Cross Gateway Fetch This section corresponds to Transaction 63 of the IHE ITI Technical Framework. Transaction 63 is used by the Initiating Gateway and Responding Gateway actors Scope This transaction is used to fetch a document or a set of documents that match a given set of metadata attribute values. The transaction always returns: Metadata, if any, for zero or more registry objects, and Zero or more Association objects (linking the targeted DocumentEntries), and Document contents, if any Use Case Roles Actor: Initiating Gateway Role: Initiates the Cross Gateway Fetch transaction for obtaining a defined set of documents Actor: Responding Gateway Role: Responds to a Cross Gateway Fetch transaction by providing the registry data and document content of a defined set of documents Referenced Standards ebrim: OASIS/ebXML Registry Information Model v3.0 - OASIS ebrim 3.0 ebrs: OASIS/ebXML Registry Services Specifications v3.0 - OASIS ebrs 3.0 MTOM: SOAP Message Transmission Optimization Mechanism - W3C MTOM XOP: XML-binary Optimized Packaging - W3C XOP ITI TF-2x: Appendix V: Web Services for IHE Transactions ITI TF-3:4 Metadata used in Document Sharing Profiles WSSE1.1: OASIS Web Service Security v1.1 22

23 Interaction Diagram Initiating Gateway Responding Gateway Cross Gateway Fetch request [ITI-63] Cross Gateway Fetch response [ITI-63] Cross Gateway Fetch Request The Cross Gateway Fetch request message is implemented as an ebrs Registry Stored Query with requesting the registry items and their linked repository items as a response. The Cross Gateway Fetch request message is fully compliant with the ebrs 3.0 standard. The request message shall use SOAP 1.2 MTOM with XOP encoded attachments Trigger Events This message is initiated when the Initiating Gateway has determined that it must interact with the Responding Gateway to obtain a document as was requested from an initial requestor Message Semantics The ebxml Registry stored query facility (Invoke Stored Query transaction) as profiled for the Cross Gateway Fetch request message shall contain the following parameters: returntype shall be LeafClassWithRepositoryItem which specifies that the AdhocQueryResponse may contain a collection of ExtrinsicObject XML elements as defined in ebrim Schema accompanied with their repository items Query ID shall be "urn:uuid:f df-a603-8f016706efe8" which indicates a Fetch (which is an adaption of the finddocuments Query as defined in ITI TF- 2a:3.18.1) Query Parameters as defined in the Query Parameters section below. Other IHE stored query types as listed in ITI TF-2a: are not defined by this transaction and the Responding Gateway may return an error Query Parameters for Cross Gateway Fetch Requests The following table lists the parameters that may be used for Cross Gateway Fetch requests. Other parameters than the ones lists below shall not be used. 23

24 Table : Query Parameters for Cross Gateway Fetch Parameter Name Description Opt Mult $XDSDocumentEntryPatientId See ITI TF-3: R - $XDSDocumentEntryClassCode See ITI TF-3: R M $XDSDocumentEntryTypeCode See ITI TF-3: O M $XDSDocumentEntryPracticeSettingCode See ITI TF-3: O M $XDSDocumentEntryCreationTimeFrom See ITI TF-3: O - $XDSDocumentEntryCreationTimeTo See ITI TF-3: O - $XDSDocumentEntryServiceStartTimeFro See ITI TF-3: O - m $XDSDocumentEntryServiceStartTimeTo See ITI TF-3: O - $XDSDocumentEntryServiceStopTimeFro m See ITI TF-3: O - $XDSDocumentEntryServiceStopTimeTo See ITI TF-3: O - $XDSDocumentEntryHealthcareFacilityTy See ITI TF-3: O M pecode $XDSDocumentEntryEventCodeList See ITI TF-3: O M $XDSDocumentEntryConfidentialityCode See ITI TF-3: O M $XDSDocumentEntryAuthorPerson See ITI TF-3: O M $XDSDocumentEntryFormatCode See ITI TF-3: O M homecommunityid See Section R Coded values shall be coded according to specification in ITI TF-2a: Coding of Code/Code-Scheme. The value for the $XDSDocumentEntryAuthorPerson parameter is a pattern compatible with the SQL keyword LIKE which allows the use of the following wildcard characters: % to match any (or no) characters and _ to match a single character. The match shall be applied to the text contained in the Value elements of the authorperson Slot on the author Classification (value strings of the authorperson sub-attribute) Use of homecommunityid The Cross Gateway Fetch request shall contain the homecommunityid, which is a globally unique identifier for a community and is used to obtain the Web Services endpoint of services that provide access to data in that community. homecommunityid is structured as an OID limited to 64 characters and specified in URI syntax, for example the homecommunityid of would be formatted as urn:oid: The use of homecommunityid in conjunction with Cross Gateway Fetch is as follows: It is a parameter to Fetch requests 24

25 The homecommunityid value is specified as the home attribute on the AdhocQuery element of the Fetch request, as in: <AdhocQuery id= home= urn:oid:1.2.3 > Each Fetch request shall only have one homecommunityid value. Separate individual Fetch requests can be used to fetch data associated with different homecommunityids. A Responding Gateway that receives a Cross Gateway Fetch request message shall behave as follows: If the homecommunityid is an identifier for a community represented by the Responding Gateway, the Responding Gateway shall process the request. If the homecommunityid is an identifier for another community that is supported by the Responding Gateway, the Responding Gateway shall forward the request to the Responding Gateway that is responsible for that community. If the value of homecommunityid is not known by the Responding Gateway, the Responding Gateway shall return an XDSUnknownCommunity error code. Verify the homecommunityid is specified on the query and return an XDSMissingHomeCommunityId error code if missing Inclusion of Document Associations In certain situations, such as patient safety reasons and local policy considerations, the Responding Gateway might be required to transport document associations alongside the requested documents. The ability to transport such additional information is explicitly supported by this transaction. Examples (non-exhaustive) of such associations can be an association to the original document that served as the basis for a transcoding/translation, an appended message such as a dispensation notice accompanying an eprescription, or a special legal disclaimer required to be put in by the document provider. The decision on what associations are to be included is based on the Responding Gateway s local policy and on the community agreement that sanctions the data transfer. In any case, the Responding Gateway only returns associations between documents which are listed in the table at ITI TF-3: It never returns other associations, for example hasmember Cross Gateway Fetch request message example <query:adhocqueryrequest> <query:responseoption returncomposedobjects="true" returntype="leafclasswithrepositoryitem"/> <rim:adhocquery id="urn:uuid:f df-a603-8f016706efe8" home= > <! Query slots go in here --> </rim:adhocquery> </query:adhocqueryrequest> 25

26 Expected Actions The Responding Gateway shall: 1. Accept a parameterized query in an AdhocQueryRequest message 2. Verify the required parameters are included in the request 3. Process the query by discovering and fetching DocumentEntries matching the query request parameters. 4. If sanctioned by a community agreement, return appropriate Association objects linking the targeted DocumentEntries (targeted by the query request parameters). 5. Return an error and zero documents for the following conditions: a) Unknown query ID b) Required parameter missing c) Invalid or unknown patient identifier d) Unknown or missing homecommunityid See Section for further error conditions and error message encoding see section ITI TF-3: If a problem occurred while transcoding documents, a TranscodingError is issued which is included in the status return value of partial success (see ). 1. Respond to the Cross Gateway Fetch request with a Cross Gateway Fetch response message (see ) Cross Gateway Fetch Response The Cross Gateway Fetch response message includes the registry items (metadata) and documents listed in the registry items. The response message shall use SOAP 1.2 MTOM with XOP encoding attachments Trigger Events The Cross Gateway Fetch response message is triggered by a Cross Gateway Fetch request message Message Semantics The Cross Gateway Fetch response message semantics and syntax shall comply with ITI TF- 2a: with the following additions. The response message syntax reuses the XML element <Document/> with namespace urn:ihe:iti:xds-b:2007. This element shall appear as the last element child of an <ExtrinsicObject/> element. The Document contents are associated with the <DocumentEntry/> (ExtrinsicObject) metadata by the fact that it is nested within the XML message. This format is considered the unoptimized format - the only one that can be represented 26

27 in pure XML. This is not the wire-format for the message but is what is specified by the schema and the WSDL (the XOP/MTOM optimization is applied afterwards). The respective part of the <DocumentEntry/> metadata looks like this: <rim:extrinsicobject> <!-- lots of stuff missing here --> <xdsext:document xmlns:xdsext="urn:ihe:iti:xds-b:2007"> VGhpcyBpcyBteSBkb2N1bWVudC4KCkl0IGlzIGdyZWF0IQo= </xdsext:document> </rim:extrinsicobject> The MTOM/XOP optimization of this content replaces the contents of the <Document/> element with a XOP reference to a different MIME part which holds the content. It is this moving of the bulky content out of the XML where it is difficult to handle and into the raw MIME multipart frame that is considered the optimization of MTOM/XOP. The resulting <Document/> element is depicted in ITI TF-2a: In addition to document metadata and document content, a Cross Gateway Fetch response may explicitly encode relationships among the documents provided. These are provided as Associations linking the DocumentEntries and placed into the <RegistryObjectList> element (see ITI TF-3: for details). As a result, the Cross Gateway Fetch response, if configured to do so (see Section ), shall return document associations as sanctioned and explicitly approved by the local policy of the document or data provider. A Cross Gateway Fetch response shall only contain those associations whose target and source objects are contained in the response. A Cross Gateway Fetch response shall only return relationships between documents, any potential hasmember associations shall never be returned. A Cross Gateway Fetch response shall not contain other objects than DocumentEntries and associations between DocumentEntries. A Cross Gateway Fetch response shall contain the document contents for each DocumentEntry in the returned metadata Expected Actions If the Cross Gateway Fetch Response is received by the Initiating Gateway shall: process the message received and make it available to the requestor Document Metadata Each provided document is further classified by metadata attributes (registry items associated with the document). The Responding Gateway shall provide document metadata attributes as 27

28 specified in ITI TF-3: Table Metadata other than that included in these tables shall not be provided by the Responding Gateway and shall not be processed by the Initiating Gateway. The classification schemes as defined in ITI TF-3: shall be used Error Codes Error conditions shall be covered according to ITI TF-3: Failures that originate in the SOAP header (including SAML assertions that are provided within the SOAP header) shall be covered by the respective error messages of the respective protocol or standard: if the Responding Gateway (acting as X-Service Provider) is unable to successfully process a X-User Assertion, it shall return an error code as described in WS-Security core specification section 12 (Error Handling, using the SOAP Fault mechanism), and the ATNA Audit event for authentication failure shall be returned according to ATNA rules (see ITI TF-2b: ) Protocol Requirements The Cross Gateway Fetch request and response will be transmitted using Synchronous or Asynchronous Web Services Exchange, according to the requirements specified in ITI TF-2x: Appendix V. The protocol requirements are identical to the Registry Stored Query except as noted below soap soap12 wsaw xsd ihe rs lcm xop query Table : WSDL Names urn:ihe:iti:xds-b:2007 urn:oasis:names:tc:ebxml-regrep:xsd:rs:3.0 urn:oasis:names:tc:ebxml-regrep:xsd:lcm:3.0 urn:oasis:names:tc:ebxml-regrep:xsd:query: Responding Gateway: These are the requirements for the Cross Gateway Fetch transaction presented in the order in which they would appear in the Responding Gateway WSDL definition: The following types shall be imported (xsd:import) in the /definitions/types section: namespace=" urn:oasis:names:tc:ebxml-regrep:xsd:query:3.0", schemalocation="query.xsd" The /definitions/message/part/@element attribute of the Cross Gateway Fetch Request message shall be defined as query:adhocqueryrequest 28

IHE IT Infrastructure Technical Framework Supplement. On-Demand Documents. Trial Implementation

IHE IT Infrastructure Technical Framework Supplement. On-Demand Documents. Trial Implementation Integrating the Healthcare Enterprise 5 IHE IT Infrastructure Technical Framework Supplement 10 On-Demand Documents 15 Trial Implementation 20 Date: October 25, 2013 Author: ITI Technical Committee Email:

More information

IHE IT Infrastructure Technical Framework Supplement. Delayed Document Assembly. Trial Implementation

IHE IT Infrastructure Technical Framework Supplement. Delayed Document Assembly. Trial Implementation Integrating the Healthcare Enterprise 5 IHE IT Infrastructure Technical Framework Supplement Delayed Document Assembly 10 Trial Implementation 15 Date: August 20, 2010 Author: Karen Witting Email: iti@ihe.net

More information

Structured Data Capture (SDC) Trial Implementation

Structured Data Capture (SDC) Trial Implementation Integrating the Healthcare Enterprise 5 IHE Quality, Research, and Public Health Technical Framework Supplement 10 Structured Data Capture (SDC) 15 Trial Implementation 20 Date: October 27, 2015 Author:

More information

IHE IT Infrastructure Technical Framework Supplement. Secure Retrieve (SeR) Trial Implementation

IHE IT Infrastructure Technical Framework Supplement. Secure Retrieve (SeR) Trial Implementation Integrating the Healthcare Enterprise 5 IHE IT Infrastructure Technical Framework Supplement 10 Secure Retrieve (SeR) 15 Trial Implementation 20 Date: August 31, 2015 Author: IHE ITI Technical Committee

More information

Structured Data Capture (SDC) Draft for Public Comment

Structured Data Capture (SDC) Draft for Public Comment Integrating the Healthcare Enterprise 5 IHE Quality, Research, and Public Health Technical Framework Supplement 10 Structured Data Capture (SDC) 15 Draft for Public Comment 20 Date: June 6, 2014 Author:

More information

IHE ITI Technical Framework Supplement. Internet User Authorization (IUA) Trial Implementation

IHE ITI Technical Framework Supplement. Internet User Authorization (IUA) Trial Implementation Integrating the Healthcare Enterprise 5 IHE ITI Technical Framework Supplement 10 Internet User Authorization (IUA) 15 Trial Implementation 20 Date: August 31, 2015 Author: ITI Technical Committee Email:

More information

IHE IT Infrastructure Technical Framework Supplement. XAD-PID Change Management (XPID) Trial Implementation

IHE IT Infrastructure Technical Framework Supplement. XAD-PID Change Management (XPID) Trial Implementation Integrating the Healthcare Enterprise 5 IHE IT Infrastructure Technical Framework Supplement 10 XAD-PID Change Management 15 Trial Implementation 20 Date: August 19, 2011 Author: ITI Technical Committee

More information

IHE IT Infrastructure Technical Framework Supplement 2007-2008. Cross-Enterprise Document Sharing-b (XDS.b)

IHE IT Infrastructure Technical Framework Supplement 2007-2008. Cross-Enterprise Document Sharing-b (XDS.b) ACC, HIMSS and RSNA Integrating the Healthcare Enterprise 5 IHE IT Infrastructure Technical Framework 2007-2008 10 Cross-Enterprise Document Sharing-b (XDS.b) 15 Draft for Trial Implementation 20 25 30

More information

Clinical Mapping (CMAP) Draft for Public Comment

Clinical Mapping (CMAP) Draft for Public Comment Integrating the Healthcare Enterprise 5 IHE Patient Care Coordination Technical Framework Supplement 10 Clinical Mapping (CMAP) 15 Draft for Public Comment 20 Date: June 1, 2015 Author: PCC Technical Committee

More information

IHE IT Infrastructure Technical Framework Supplement 2007-2008

IHE IT Infrastructure Technical Framework Supplement 2007-2008 ACC, HIMSS and RSNA Integrating the Healthcare Enterprise 5 10 IHE IT Infrastructure Technical Framework Supplement 2007-2008 Template for XDS Affinity Domain Deployment Planning 15 20 Draft for Trial

More information

IHE IT Infrastructure Technical Framework Supplement. Document Digital Signature (DSG) Trial Implementation

IHE IT Infrastructure Technical Framework Supplement. Document Digital Signature (DSG) Trial Implementation Integrating the Healthcare Enterprise 5 IHE IT Infrastructure Technical Framework Supplement 10 Document Digital Signature (DSG) 15 Trial Implementation 20 Date: March 12, 2015 Author: IHE ITI Technical

More information

IHE Radiology Technical Framework Supplement. Trial Implementation

IHE Radiology Technical Framework Supplement. Trial Implementation Integrating the Healthcare Enterprise 5 IHE Radiology Technical Framework Supplement 10 Cross-Enterprise Document Reliable Interchange of Images (XDR-I) 15 Trial Implementation 20 Date: July 30, 2014 Author:

More information

IHE Patient Care Coordination Technical Framework Supplement. Trial Implementation

IHE Patient Care Coordination Technical Framework Supplement. Trial Implementation Integrating the Healthcare Enterprise 5 IHE Patient Care Coordination Technical Framework Supplement 10 Cross Enterprise TeleHomeMonitoring Workflow Definition Profile (XTHM- 15 Trial Implementation 20

More information

IHE IT Infrastructure Technical Framework Supplement. Document Encryption (DEN) Trial Implementation

IHE IT Infrastructure Technical Framework Supplement. Document Encryption (DEN) Trial Implementation Integrating the Healthcare Enterprise 5 IHE IT Infrastructure Technical Framework Supplement 10 Document Encryption (DEN) 15 Trial Implementation 20 Date: August 19, 2011 Author: ITI Technical Committee

More information

IHE Patient Care Device Technical Framework Supplement. Medical Equipment Management Device Management Communication (MEMDMC) Trial Implementation

IHE Patient Care Device Technical Framework Supplement. Medical Equipment Management Device Management Communication (MEMDMC) Trial Implementation Integrating the Healthcare Enterprise 5 IHE Patient Care Device Technical Framework Supplement 10 Medical Equipment Management Device Management Communication (MEMDMC) 15 Trial Implementation 20 Date:

More information

IHE Pharmacy Technical Framework Supplement. Pharmacy Medication List (PML) Trial Implementation

IHE Pharmacy Technical Framework Supplement. Pharmacy Medication List (PML) Trial Implementation Integrating the Healthcare Enterprise 5 IHE Pharmacy Technical Framework Supplement 10 Pharmacy Medication List (PML) 15 Trial Implementation 20 Date: September 29, 2014 Author: IHE Pharmacy Technical

More information

Run-time Service Oriented Architecture (SOA) V 0.1

Run-time Service Oriented Architecture (SOA) V 0.1 Run-time Service Oriented Architecture (SOA) V 0.1 July 2005 Table of Contents 1.0 INTRODUCTION... 1 2.0 PRINCIPLES... 1 3.0 FERA REFERENCE ARCHITECTURE... 2 4.0 SOA RUN-TIME ARCHITECTURE...4 4.1 FEDERATES...

More information

ConnectVirginia EXCHANGE Onboarding and Certification Guide. Version 1.4

ConnectVirginia EXCHANGE Onboarding and Certification Guide. Version 1.4 ConnectVirginia EXCHANGE Onboarding and Certification Guide Version 1.4 July 18, 2012 CONTENTS 1 Overview... 5 2 Intended Audience... 5 3 ConnectVirginia Background... 5 3.1 Federated... 5 3.2 Secure...

More information

IHE IT Infrastructure White Paper. Health Information Exchange: Enabling Document Sharing Using IHE Profiles

IHE IT Infrastructure White Paper. Health Information Exchange: Enabling Document Sharing Using IHE Profiles Integrating the Healthcare Enterprise IHE IT Infrastructure White Paper Health Information Exchange: Enabling Document Sharing Using IHE Profiles Date: January 24, 2012 Author: Email: Karen Witting, John

More information

IHE IT Infrastructure Technical Framework Supplement. Healthcare Provider Directory (HPD) Trial Implementation

IHE IT Infrastructure Technical Framework Supplement. Healthcare Provider Directory (HPD) Trial Implementation Integrating the Healthcare Enterprise 5 IHE IT Infrastructure Technical Framework Supplement 10 Healthcare Directory (HPD) 15 Trial Implementation 20 Date: August 31, 2015 Author: IHE ITI Technical Committee

More information

Introduction to UDDI: Important Features and Functional Concepts

Introduction to UDDI: Important Features and Functional Concepts : October 2004 Organization for the Advancement of Structured Information Standards www.oasis-open.org TABLE OF CONTENTS OVERVIEW... 4 TYPICAL APPLICATIONS OF A UDDI REGISTRY... 4 A BRIEF HISTORY OF UDDI...

More information

Document Sharing Module

Document Sharing Module HIS Interoperability Framework Service Layer Document Sharing Module Document Identification Reference HIS-IF-Service_Layer-Document_Sharing_Module_v1.1.0 Date Created 06/03/2009 Date Modified 17/11/2010

More information

SINTERO SERVER. Simplifying interoperability for distributed collaborative health care

SINTERO SERVER. Simplifying interoperability for distributed collaborative health care SINTERO SERVER Simplifying interoperability for distributed collaborative health care Tim Benson, Ed Conley, Andrew Harrison, Ian Taylor COMSCI, Cardiff University What is Sintero? Sintero Server is a

More information

Electronic Health Records and XDS the IHE approach

Electronic Health Records and XDS the IHE approach Electronic Health Records and XDS the IHE approach Bill Majurski National Institute of Standards and Technology (NIST) Berthold B. Wein IHE-D User Co-Chair, Aachen, Germany Overview Expectations as user

More information

INTEGRATING THE ESANTÉ DSP INTO GECAMED

INTEGRATING THE ESANTÉ DSP INTO GECAMED INTEGRATING THE ESANTÉ DSP INTO GECAMED A smooth integration of the Luxemburgish «dossier de soins partagé» (DSP) in the open source medical record system, GECAMed 1 THE GECAMED - ESANTÉ PROJECT Since

More information

IHE Patient Care Coordination (PCC) Technical Framework Supplement. Referral/Order Linking (ROL) Trial Implementation

IHE Patient Care Coordination (PCC) Technical Framework Supplement. Referral/Order Linking (ROL) Trial Implementation Integrating the Healthcare Enterprise 5 IHE Patient Care Coordination (PCC) Technical Framework Supplement 10 Referral/Order Linking 15 Trial Implementation 20 Date: November 4, 2014 Author: IHE PCC Technical

More information

Practical Guidance to Implement Meaningful Use Stage 2 Secure Health Transport for Certification and Meaningful Use

Practical Guidance to Implement Meaningful Use Stage 2 Secure Health Transport for Certification and Meaningful Use Practical Guidance to Implement Meaningful Use Stage 2 Secure Health Transport for Certification and Meaningful Use 1. Introduction Electronic Health Record Association Standards and Interoperability Workgroup

More information

Clinical Research Document (CRD) Trial Implementation

Clinical Research Document (CRD) Trial Implementation Integrating the Healthcare Enterprise 5 IHE Quality, Research and Public Health Technical Framework Supplement 10 Clinical Research Document (CRD) 15 Trial Implementation 20 Date: October 27, 2015 Author:

More information

The Global Justice Reference Architecture (JRA) Web Services Service Interaction Profile

The Global Justice Reference Architecture (JRA) Web Services Service Interaction Profile The Global Justice Reference Architecture (JRA) Web Services Service Interaction Profile V 1.1 by The Global Infrastructure/Standards Working Group August 1, 2007 Table of Contents Acknowledgements...

More information

Electronic Health Network - Case Study Consent2Share Share with Confidence

Electronic Health Network - Case Study Consent2Share Share with Confidence Electronic Health Network - Case Study Consent2Share Share with Confidence Jan 2015 About Consent2Share Complying with privacy regulations in an electronic environment is a very complex process. The Consent2Share

More information

XDS-I - CROSS-ENTERPRISE DOCUMENT SHARING FOR IMAGING

XDS-I - CROSS-ENTERPRISE DOCUMENT SHARING FOR IMAGING Technical White Paper XDS-I - CROSS-ENTERPRISE DOCUMENT SHARING FOR IMAGING Physicians, nurses, administrators and other healthcare professionals foresee a day when vital information can flow seamlessly

More information

IHE Eye Care Technical Framework Supplement. Unified Eye Care Workflow Refractive Measurements (U-EYECARE Refractive) Draft for Public Comment

IHE Eye Care Technical Framework Supplement. Unified Eye Care Workflow Refractive Measurements (U-EYECARE Refractive) Draft for Public Comment Integrating the Healthcare Enterprise 5 IHE Eye Care Technical Framework Supplement 10 Unified Eye Care Workflow Refractive Measurements (U-EYECARE Refractive) 15 Draft for Public Comment 20 Date: April

More information

IHE Patient Care Coordination Technical Framework Supplement. Emergency Department Encounter Summary (EDES) (includes CTNN, EDPN, and NN, TN)

IHE Patient Care Coordination Technical Framework Supplement. Emergency Department Encounter Summary (EDES) (includes CTNN, EDPN, and NN, TN) Integrating the Healthcare Enterprise 5 IHE Patient Care Coordination Technical Framework Supplement 10 Emergency Department Encounter Summary (EDES) (includes CTNN, EDPN, and NN, TN) 15 Trial Implementation

More information

IHE Radiology Technical Framework Supplement. Trial Implementation

IHE Radiology Technical Framework Supplement. Trial Implementation Integrating the Healthcare Enterprise 5 IHE Radiology Technical Framework Supplement 10 Management of Radiology Report Templates (MRRT) 15 Trial Implementation 20 Date: April 21, 2015 Authors: IHE Radiology

More information

Introduction to Service Oriented Architectures (SOA)

Introduction to Service Oriented Architectures (SOA) Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction

More information

Secure Semantic Web Service Using SAML

Secure Semantic Web Service Using SAML Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA

More information

Interoperability testing in Finland. Konstantin Hyppönen Summit on Interoperability (DK) 21.1.2014

Interoperability testing in Finland. Konstantin Hyppönen Summit on Interoperability (DK) 21.1.2014 Interoperability testing in Finland Konstantin Hyppönen Summit on Interoperability (DK) 21.1.2014 Contents 1. Overview of the Finnish national ehealth infrastructure 2. Interoperability testing requirements

More information

Sharing images and documents between Enterprise VNAs Using IEP and XDS standards. Dave Harvey MRCP FRCR Medical Connections Ltd

Sharing images and documents between Enterprise VNAs Using IEP and XDS standards. Dave Harvey MRCP FRCR Medical Connections Ltd Sharing images and documents between Enterprise VNAs Using IEP and XDS standards Dave Harvey MRCP FRCR Medical Connections Ltd Declaration of Interest Medical Connections Ltd supplies software which is

More information

A Framework for Testing Distributed Healthcare Applications

A Framework for Testing Distributed Healthcare Applications A Framework for Testing Distributed Healthcare Applications R. Snelick 1, L. Gebase 1, and G. O Brien 1 1 National Institute of Standards and Technology (NIST), Gaithersburg, MD, State, USA Abstract -

More information

HIMSS Interoperability Showcase 2011

HIMSS Interoperability Showcase 2011 Interoperability will bind together a wide network of real-time life critical data that not only transform but become healthcare. Health Information Interoperability Challenges Healthcare and healthcare

More information

IHE IT Infrastructure Technical Framework Supplement. Add RESTful Query to ATNA. Draft for Public Comment

IHE IT Infrastructure Technical Framework Supplement. Add RESTful Query to ATNA. Draft for Public Comment Integrating the Healthcare Enterprise 5 IHE IT Infrastructure Technical Framework Supplement 10 Add RESTful Query to ATNA 15 Draft for Public Comment 20 Date: June 8, 2015 Author: IHE ITI Technical Committee

More information

End-to-End Security for Personal Telehealth

End-to-End Security for Personal Telehealth End-to-End Security for Personal Telehealth Paul KOSTER a,1, Muhammad ASIM a, Milan PETKOVIC a, b a Philips Research, b TU/e, Eindhoven, The Netherlands Abstract. Personal telehealth is in rapid development

More information

South Carolina Health Information Exchange (SCHIEx)

South Carolina Health Information Exchange (SCHIEx) South Carolina Health Information Exchange (SCHIEx) Interoperability Services Guide Draft September, 2011- v1.5 Himabindu Bolisetty Interoperability Services Lead (CareEvolution) Ian Cassel Interoperability

More information

IHE Radiology Technical Framework Supplement. Web-based Image Capture (WIC) Draft for Public Comment

IHE Radiology Technical Framework Supplement. Web-based Image Capture (WIC) Draft for Public Comment Integrating the Healthcare Enterprise 5 IHE Radiology Technical Framework Supplement 10 Web-based Image Capture (WIC) 15 Draft for Public Comment 20 Date: February 19, 2015 Author: IHE Radiology Technical

More information

Healthcare Link User's Guide

Healthcare Link User's Guide Healthcare Link User's Guide Clinical Research Data Capture Introduction Healthcare Link is a CDISC initiative with the overarching goals to make it easier for physicians/healthcare sites to participate

More information

WEB SERVICES SECURITY

WEB SERVICES SECURITY WEB SERVICES SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

SAML Federated Identity at OASIS

SAML Federated Identity at OASIS International Telecommunication Union SAML Federated Identity at OASIS Hal Lockhart BEA Systems Geneva, 5 December 2006 SAML and the OASIS SSTC o SAML: Security Assertion Markup Language A framework for

More information

HIMSS Interoperability Showcase 2011

HIMSS Interoperability Showcase 2011 Interoperability will bind together a wide network of real-time life critical data that not only transform but become healthcare. Health Information Interoperability Challenges and Integrating Healthcare

More information

Service Virtualization: Managing Change in a Service-Oriented Architecture

Service Virtualization: Managing Change in a Service-Oriented Architecture Service Virtualization: Managing Change in a Service-Oriented Architecture Abstract Load balancers, name servers (for example, Domain Name System [DNS]), and stock brokerage services are examples of virtual

More information

Developers Integration Lab (DIL) System Architecture, Version 1.0

Developers Integration Lab (DIL) System Architecture, Version 1.0 Developers Integration Lab (DIL) System Architecture, Version 1.0 11/13/2012 Document Change History Version Date Items Changed Since Previous Version Changed By 0.1 10/01/2011 Outline Laura Edens 0.2

More information

IHE Pharmacy Technical Framework Supplement. Medication Treatment Plan (MTP) Trial Implementation

IHE Pharmacy Technical Framework Supplement. Medication Treatment Plan (MTP) Trial Implementation Integrating the Healthcare Enterprise 5 IHE Pharmacy Technical Framework Supplement 10 Medication Treatment Plan (MTP) 15 Trial Implementation 20 Date: October 23, 2015 Author: IHE Pharmacy Technical Committee

More information

IHE cross-enterprise document sharing for imaging: interoperability testing software

IHE cross-enterprise document sharing for imaging: interoperability testing software SOFTWARE REVIEW Open Access IHE cross-enterprise document sharing for imaging: interoperability testing software Rita Noumeir *, Bérubé Renaud Abstract Background: With the deployments of Electronic Health

More information

develop privacy policies, and implement them with role-based or other access control mechanisms supported by EHR systems.

develop privacy policies, and implement them with role-based or other access control mechanisms supported by EHR systems. Basic Patient Privacy Consents (BPPC) provides a mechanism to record the patient privacy consent(s), a method to mark documents published to XDS with the patient privacy consent that was used to authorize

More information

GRA Reliable Secure Web Services Service Interaction Profile Version 1.2 Table of Contents

GRA Reliable Secure Web Services Service Interaction Profile Version 1.2 Table of Contents Table of Contents Acknowledgements... v Document Conventions... vi 1. Introduction and Purpose...1 1.1. Profile Selection Guidance...1 1.2. Usage...1 1.3. Profiles, Standards, and Recommendations...2 1.4.

More information

Practical Guidance to Implement Meaningful Use Stage 2. Secure Health Transport for Certification and Meaningful Use

Practical Guidance to Implement Meaningful Use Stage 2. Secure Health Transport for Certification and Meaningful Use Practical Guidance to Implement Meaningful Use Stage 2 1. Introduction Association Standards and Interoperability Workgroup Meaningful Use (MU) Stage 2 introduces three transport standards for use in healthcare

More information

IHE Eye Care Technical Framework Supplement. Basic Eye Care Workflow (B-EYECARE) Trial Implementation

IHE Eye Care Technical Framework Supplement. Basic Eye Care Workflow (B-EYECARE) Trial Implementation Integrating the Healthcare Enterprise 5 IHE Eye Care Technical Framework Supplement 10 Basic Eye Care Workflow (B-EYECARE) Trial Implementation 15 20 Date: April 16, 2012 Author: IHE Eye Care Domain Email:

More information

IHE Radiology Technical Framework Supplement. Invoke Image Display (IID) Trial Implementation

IHE Radiology Technical Framework Supplement. Invoke Image Display (IID) Trial Implementation Integrating the Healthcare Enterprise 5 IHE Radiology Technical Framework Supplement 10 Invoke Image Display (IID) 15 Trial Implementation 20 Date: April 21, 2015 Author: IHE Radiology Technical Committee

More information

Healthcare Provider Directories. Eric Heflin, CTO/CIO Healtheway & CTO HIETexas

Healthcare Provider Directories. Eric Heflin, CTO/CIO Healtheway & CTO HIETexas Healthcare Directories Eric Heflin, CTO/CIO Healtheway & CTO HIETexas 1 HPD Introduction Business Context Problem statement Definition Selected Use Cases Scope Value Technical Implementation Actors Options

More information

IHE Implementation Case Study: French Electronic Health Record Program

IHE Implementation Case Study: French Electronic Health Record Program IHE Implementation Case Study: French Electronic Health Record Program Project Name French Electronic Health Record (DMP system-dossier Médical Personnel) developed, implemented and rolled out by ASIP

More information

IMAGE SHARING. Review and Update - A Fond Farewell to CDs 2012

IMAGE SHARING. Review and Update - A Fond Farewell to CDs 2012 IMAGE SHARING Review and Update - A Fond Farewell to CDs 2012 David S. Mendelson, M.D. Professor of Radiology Chief of Clinical Informatics The Mount Sinai Medical Center Co-chair IHE International Board

More information

XML Signatures in an Enterprise Service Bus Environment

XML Signatures in an Enterprise Service Bus Environment XML Signatures in an Enterprise Bus Environment Eckehard Hermann Research & Development XML Integration Uhlandstraße 12 64297 Darmstadt, Germany Eckehard.Hermann@softwareag.com Dieter Kessler Research

More information

Introduction to Web Services

Introduction to Web Services Department of Computer Science Imperial College London CERN School of Computing (icsc), 2005 Geneva, Switzerland 1 Fundamental Concepts Architectures & escience example 2 Distributed Computing Technologies

More information

Requirements for Interoperability in Healthcare Information Systems

Requirements for Interoperability in Healthcare Information Systems Journal of Healthcare Engineering Vol. 3 No. 2 2012 Page 323 346 323 Requirements for Interoperability in Healthcare Information Systems Rita Noumeir Department of Electrical Engineering École de Technologie

More information

Building Regional and National Health Information Systems. Mike LaRocca

Building Regional and National Health Information Systems. Mike LaRocca Building Regional and National Health Information Systems Mike LaRocca Agenda What are the key use cases driving New York? What is the SHIN-NY NY and its architecture? What standards and protocols were

More information

IHE Patient Care Coordination (PCC) Technical Framework Supplement. Patient Plan of Care (PPOC) Trial Implementation

IHE Patient Care Coordination (PCC) Technical Framework Supplement. Patient Plan of Care (PPOC) Trial Implementation Integrating the Healthcare Enterprise 5 IHE Patient Care Coordination (PCC) Technical Framework Supplement 10 Patient Plan of Care (PPOC) Trial Implementation 15 20 Date: September 9, 2011 Author: Keith

More information

Service-Oriented Architectures

Service-Oriented Architectures Architectures Computing & 2009-11-06 Architectures Computing & SERVICE-ORIENTED COMPUTING (SOC) A new computing paradigm revolving around the concept of software as a service Assumes that entire systems

More information

MFI 4 Extended Registry SC32/WG2

MFI 4 Extended Registry SC32/WG2 ISO/IEC 19763 44 MFI 4 Extended Registry Masaharu Obayashi SC32/WG2 2010.05.20 The relationship between Part 4 and the other parts (1) Specialization approach The metamodels of MFI 3,5,6,7,8,9,,,, are

More information

IHE Patient Care Coordination Technical Framework Supplement. Patient Plan of Care (PPOC) Trial Implementation

IHE Patient Care Coordination Technical Framework Supplement. Patient Plan of Care (PPOC) Trial Implementation Integrating the Healthcare Enterprise 5 IHE Patient Care Coordination Technical Framework Supplement 10 Patient Plan of Care (PPOC) 15 Trial Implementation 20 Date: October 4, 2013 Author: IHE PCC Technical

More information

Setting Up an AS4 System

Setting Up an AS4 System INT0697_150625 Setting up an AS4 system V1r0 1 Setting Up an AS4 System 2 Version 1r0 ENTSOG AISBL; Av. de Cortenbergh 100, 1000-Brussels; Tel: +32 2 894 5100; Fax: +32 2 894 5101; info@entsog.eu, www.entsog.eu,

More information

OpenHRE Security Architecture. (DRAFT v0.5)

OpenHRE Security Architecture. (DRAFT v0.5) OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2

More information

IHE-XDS und Co. Erfahrungen im health@net Projekt

IHE-XDS und Co. Erfahrungen im health@net Projekt IHE-XDS und Co. Erfahrungen im health@net Projekt Florian Wozak Oct 22, 2004 1 IHE-XDS-Cross-enterprise Document Sharing IHE Overview I IHE is an initiative by healthcare professionals and industry founded

More information

Data Provenance. Functional Requirements Document: Developed in Response to the Data Provenance Task Force Recommendations. Version 1.

Data Provenance. Functional Requirements Document: Developed in Response to the Data Provenance Task Force Recommendations. Version 1. Data Provenance Functional Requirements Document: Developed in Response to the Data Provenance Task Force Recommendations Version 1.0 May 2015 Version History Version Revision Author Description of Change

More information

IHE IT Infrastructure White Paper. A Service-Oriented Architecture (SOA) View of IHE Profiles. Public Comment

IHE IT Infrastructure White Paper. A Service-Oriented Architecture (SOA) View of IHE Profiles. Public Comment Integrating the Healthcare Enterprise 5 IHE IT Infrastructure White Paper 10 A Service-Oriented Architecture (SOA) View of IHE Profiles Public Comment 15 20 Date: September 28, 2009 Author: Joshua Painter

More information

Digital Signature Web Service Interface

Digital Signature Web Service Interface 1 2 Digital Signature Web Service Interface 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 1 Introduction This document describes an RPC interface for a centralized

More information

1 What Are Web Services?

1 What Are Web Services? Oracle Fusion Middleware Introducing Web Services 11g Release 1 (11.1.1) E14294-04 January 2011 This document provides an overview of Web services in Oracle Fusion Middleware 11g. Sections include: What

More information

IHE Radiology Technical Framework Supplement. Imaging Object Change Management (IOCM) Trial Implementation

IHE Radiology Technical Framework Supplement. Imaging Object Change Management (IOCM) Trial Implementation Integrating the Healthcare Enterprise 5 10 IHE Radiology Technical Framework Supplement Imaging Object Change Management 15 Trial Implementation 20 Date: May 17, 2011 Author: Kinson Ho, David Heaney Email:

More information

Clinical Document Exchange Integration Guide - Outbound

Clinical Document Exchange Integration Guide - Outbound Clinical Document Exchange Integration Guide - Outbound Integrate your healthcare IT system with Practice Fusion s Electronic Health Record (EHR) System Table of Contents 1 Introduction... 2 2 Integration

More information

Medical Privacy Version 2015.12.10 - Standard. Business Associate Agreement. 1. Definitions

Medical Privacy Version 2015.12.10 - Standard. Business Associate Agreement. 1. Definitions Medical Privacy Version 2015.12.10 - Standard Business Associate Agreement This Business Associate Agreement (the Agreement ) shall apply to the extent that the Lux Scientiae HIPAA Customer signee is a

More information

U.S. FDA Title 21 CFR Part 11 Compliance Assessment of SAP Records Management

U.S. FDA Title 21 CFR Part 11 Compliance Assessment of SAP Records Management U.S. FDA Title 21 CFR Part 11 Compliance Assessment of SAP Records Management Disclaimer These materials are subject to change without notice. SAP AG s compliance analysis with respect to SAP software

More information

Automated Threat Prioritization Web Service

Automated Threat Prioritization Web Service for the Automated Threat Prioritization Web Service DHS/ICE/PIA-028 June 6, 2011 Contact Point Luke McCormack Chief Information Officer U.S. Immigration and Customs Enforcement (202) 732-3100 Reviewing

More information

NIST s Guide to Secure Web Services

NIST s Guide to Secure Web Services NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication 800-95:

More information

Implementing Interoperability using an IHE Profile for Interfacility Patient Transport

Implementing Interoperability using an IHE Profile for Interfacility Patient Transport Implementing Interoperability using an IHE Profile for Interfacility Patient Transport Philip DePalo, Yeong-Tae Song Dept. of Computer & Information Sciences Towson University Towson, MD USA pdepal1@students.towson.edu

More information

Developing Java Web Services

Developing Java Web Services Page 1 of 5 Developing Java Web Services Hands On 35 Hours Online 5 Days In-Classroom A comprehensive look at the state of the art in developing interoperable web services on the Java EE platform. Students

More information

Social Security Administration (SSA) Experience with Provider Directory HIT Security and Privacy WG

Social Security Administration (SSA) Experience with Provider Directory HIT Security and Privacy WG Social Security Administration (SSA) Experience with Provider Directory HIT Security and Privacy WG Presenters: Shanks Kande, Nitin Jain Date: 04/06/2011 1 Social Security Administration Use of Provider

More information

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Michael P. Papazoglou (INFOLAB/CRISM, Tilburg University, The Netherlands)

More information

Turkey s National Health Information System (NHIS)

Turkey s National Health Information System (NHIS) Turkey s National Health Information System (NHIS) İlker KÖSE 1, Nihat AKPINAR 1, Murat GÜREL 1, Yakup ARSLAN 1, Hakan ÖZER 1, Nihat YURT 1, Yıldıray KABAK 2, Asuman DOGAC 3 1 Dept. of Information Processing,

More information

nehta Commissioning Requirements for Secure Message Delivery Secure Messaging 19 December 2012 National E-Health Transition Authority

nehta Commissioning Requirements for Secure Message Delivery Secure Messaging 19 December 2012 National E-Health Transition Authority nehta Secure Messaging Commissioning Requirements for Secure Message Delivery 19 December 2012 National E-Health Transition Authority National E-Health Transition Authority Ltd Level 25 56 Pitt Street

More information

Cloud-based Identity and Access Control for Diagnostic Imaging Systems

Cloud-based Identity and Access Control for Diagnostic Imaging Systems Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering University of Ontario Institute of Technology

More information

IHE Eye Care Technical Framework Supplement. Core Eye Care Workflow (Improved Appointment Scheduling and No Archive) (C-EYECARE) Trial Implementation

IHE Eye Care Technical Framework Supplement. Core Eye Care Workflow (Improved Appointment Scheduling and No Archive) (C-EYECARE) Trial Implementation Integrating the Healthcare Enterprise 5 IHE Eye Care Technical Framework Supplement 10 15 Core Eye Care Workflow (Improved Appointment Scheduling and No Archive) (C-EYECARE) Trial Implementation 20 Date:

More information

SOA GOVERNANCE MODEL

SOA GOVERNANCE MODEL SOA GOVERNANCE MODEL Matjaz B. Juric University of Ljubljana, Slovenia matjaz.juric@fri.uni-lj.si Eva Zupancic University of Ljubljana, Slovenia Abstract: Service Oriented Architecture (SOA) has become

More information

IHE IT Infrastructure Technical Framework Supplement. Patient Demographics Query for Mobile (PDQm) Trial Implementation

IHE IT Infrastructure Technical Framework Supplement. Patient Demographics Query for Mobile (PDQm) Trial Implementation Integrating the Healthcare Enterprise 5 IHE IT Infrastructure Technical Framework Supplement 10 Patient Demographics Query for Mobile (PDQm) 15 Trial Implementation 20 Date: August 31, 2015 Author: IHE

More information

Research on the Model of Enterprise Application Integration with Web Services

Research on the Model of Enterprise Application Integration with Web Services Research on the Model of Enterprise Integration with Web Services XIN JIN School of Information, Central University of Finance& Economics, Beijing, 100081 China Abstract: - In order to improve business

More information

Advanced Matching and IHE Profiles

Advanced Matching and IHE Profiles Oracle Healthcare Master Person Index INTEGRATING THE HEALTHCARE ENTERPRISE Oracle Healthcare Master Person Index provides a single point of reference to information about a patient, clinician, payer,

More information

EHR Interoperability Framework Overview

EHR Interoperability Framework Overview Hospital Health Information System EU HIS Contract No. IPA/2012/283-805 Final version July 2015 Visibility: Public Target Audience: EHR Developers EHR Administrators EPR Systems Developers This document

More information

JOHN KNEILING APRIL 3-5, 2006 APRIL 6-7, 2006 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

JOHN KNEILING APRIL 3-5, 2006 APRIL 6-7, 2006 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS JOHN KNEILING CREATING XML AND WEB SERVICES SOLUTIONS SECURING THE WEB SERVICES ENVIRONMENT APRIL 3-5, 2006 APRIL 6-7, 2006 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME

More information

Christoph Bussler. B2B Integration. Concepts and Architecture. With 165 Figures and 4 Tables. IIIBibliothek. Springer

Christoph Bussler. B2B Integration. Concepts and Architecture. With 165 Figures and 4 Tables. IIIBibliothek. Springer Christoph Bussler B2B Integration Concepts and Architecture With 165 Figures and 4 Tables IIIBibliothek Springer Contents Part I Introduction to Business-to-Business Integration.... 1 1 History 3 1.1 Why

More information

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

Health Record Banking Alliance White Paper

Health Record Banking Alliance White Paper Health Record Banking Alliance White Paper A Proposed National Infrastructure for HIE Using Personally Controlled Records January 4, 2013 Table of Contents Executive Summary...3 I. Overview...5 II. Architectural

More information

1 What Are Web Services?

1 What Are Web Services? Oracle Fusion Middleware Introducing Web Services 11g Release 1 (11.1.1.6) E14294-06 November 2011 This document provides an overview of Web services in Oracle Fusion Middleware 11g. Sections include:

More information